Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Access control (1)
- Arduino (1)
- Autonomous AI (1)
- Camera validation (1)
- Cascade Size (1)
-
- Cascading Failures (1)
- Clustering (1)
- Community Structures (1)
- Convolutional Neural Networks (CNN) (1)
- Critical Components (1)
- Cryptography (1)
- Cyber-Physical System (1)
- Data Availability (1)
- Data Mining (1)
- Deep Learning (1)
- Differential Privacy (1)
- Differential power analysis attacks (1)
- Electric Vehicle Charging Infrastructure (1)
- Electrical Controls (1)
- Electronic Components (1)
- Global Environment for Networking Innovations (1)
- Hardware security (1)
- Indoor Positioning (1)
- Industry 4.0 (1)
- Intelligent Networking (1)
- Lead Tinning (1)
- Leakage power analysis attacks (1)
- Mobile Robot (1)
- Multi-agent Collaboration (1)
- Multi-agent Coordination (1)
Articles 1 - 10 of 10
Full-Text Articles in Computer Engineering
Cyber-Physical Multi-Robot Systems In A Smart Factory: A Networked Ai Agents Approach, Zixiang Nie
Cyber-Physical Multi-Robot Systems In A Smart Factory: A Networked Ai Agents Approach, Zixiang Nie
USF Tampa Graduate Theses and Dissertations
This dissertation focuses on addressing the technical challenges of non-stationarity in smart factories through the use of cyber-physical AI agents. Industry 4.0 and smart manufacturing with smart factories as a central role, have a growing demand for Just-in-Time (JIT) and on-demand production, as well as mass customization—all while maintaining high productivity, resource efficiency and resilience. This research positions Multi-Robot Systems (MRS)-driven smart factories. The heterogeneous production and transportation robots in an MRS collaborate to form multiple real-time adjusted production flows achieving the flexibility to accommodate such on-demand, mass customization.
However, the implementation of MRS introduces new sets of challenges, including …
Process Automation And Robotics Engineering For Industrial Processing Systems, Drake Stimpson
Process Automation And Robotics Engineering For Industrial Processing Systems, Drake Stimpson
USF Tampa Graduate Theses and Dissertations
Automation in industrial systems applications has emerged as the fundamental solution for improving quality, production rate, and efficiency of a process. Much of the recent popularity surrounding the transition of processes from manually operated tasks to automated systems can be attributed to the concept of Industry 4.0, which outlines the fundamental guidelines for integrating cyber-physical systems into industrial processes. Due to rapid advancement of technology in robotics and automation as well as the increase in accessibility of resources to this technology, the capability to develop automated systems has become feasible for small-scale enterprise. This work presents a two-part initiative to …
Analysis Of Denial Of Service Attacks In Emerging Software Defined Network Infrastructures, Andrea P. Wright
Analysis Of Denial Of Service Attacks In Emerging Software Defined Network Infrastructures, Andrea P. Wright
USF Tampa Graduate Theses and Dissertations
Software defined networking (SDN) improves upon traditional networking protocol technologies by decoupling the data and control planes and moving all control provisioning decisions to a centralized SDN controller entity. This concept has matured over the last decade, having gained strong industry traction, and is now being widely deployed within enterprise and carrier networks to streamline network services provisioning and reduce costs. Overall, centralized control delivers much more cost-effective and flexible networking setups that can support a wide range of customized user-driven network management applications, e.g., traffic engineering, security, survivability, admission control, policy control, etc.
However, the separation of the data …
Strategies In Botnet Detection And Privacy Preserving Machine Learning, Di Zhuang
Strategies In Botnet Detection And Privacy Preserving Machine Learning, Di Zhuang
USF Tampa Graduate Theses and Dissertations
Peer-to-peer (P2P) botnets have become one of the major threats in network security for serving as the infrastructure that responsible for various of cyber-crimes. Though a few existing work claimed to detect traditional botnets effectively, the problem of detecting P2P botnets involves more challenges. In this dissertation, we present two P2P botnet detection systems, PeerHunter and Enhanced PeerHunter. PeerHunter starts from a P2P hosts detection component. Then, it uses mutual contacts as the main feature to cluster bots into communities. Finally, it uses community behavior analysis to detect potential botnet communities and further identify bot candidates. Enhanced PeerHunter is an …
Service Provisioning And Security Design In Software Defined Networks, Mohamed Rahouti
Service Provisioning And Security Design In Software Defined Networks, Mohamed Rahouti
USF Tampa Graduate Theses and Dissertations
Information and Communications Technology (ICT) infrastructures and systems are being widely deployed to support a broad range of users and application scenarios. A key trend here is the emergence of many different "smart" technology paradigms along with an increasingly diverse array of networked sensors, e.g., for smart homes and buildings, intelligent transportation and autonomous systems, emergency response, remote health monitoring and telehealth, etc. As billions of these devices come online, ICT networks are being tasked with transferring increasing volumes of data to support intelligent real-time decision making and management. Indeed, many applications and services will have very stringent Quality of …
Design Of Delro Autonomous Delivery Robot And Ai Based Localization, Tolga Karakurt
Design Of Delro Autonomous Delivery Robot And Ai Based Localization, Tolga Karakurt
USF Tampa Graduate Theses and Dissertations
Autonomous robots are employed in numerous areas. In this thesis, it is proposed to design and build a self-controlled wheeled vehicle to deliver food.
As there are many applications of an autonomous agent for indoor and outdoor environments, this study is conducted on indoor settings whereas all the requirements and design processes are achieved for both operational boundaries.
The fundamental approach is to design and implement a Wheeled Mobile Robot (WMR), and to test skid-steering performance on proposed trajectories using a System Engineering approach. From this point of view, system requirements in mechanical, electrical, and software are evaluated, and overall …
Reliability Analysis Of Power Grids And Its Interdependent Infrastructures: An Interaction Graph-Based Approach, Upama Nakarmi
Reliability Analysis Of Power Grids And Its Interdependent Infrastructures: An Interaction Graph-Based Approach, Upama Nakarmi
USF Tampa Graduate Theses and Dissertations
Large blackouts with significant societal and economic impacts result from cascade of failures in the transmission network of power grids. Understanding and mitigating cascading failures in power grids is challenging due to the large number of components and their complex interactions, wherein, in addition to the physical topology of the system, the physics of power flow and functional dependencies among components largely affect the spatial distribution and propagation of failures. In this dissertation, data-driven interaction graphs, which help in capturing the underlying interactions and influences among the components during cascading failures, are used for capturing the non-local nature of propagation …
Exploiting On-Chip Voltage Regulators As A Countermeasure Against Power Analysis Attacks, Weize Yu
Exploiting On-Chip Voltage Regulators As A Countermeasure Against Power Analysis Attacks, Weize Yu
USF Tampa Graduate Theses and Dissertations
Non-invasive side-channel attacks (SCA) are powerful attacks which can be used to obtain the secret key in a cryptographic circuit in feasible time without the need for expensive measurement equipment. Power analysis attacks (PAA) are a type of SCA that exploit the correlation between the leaked power consumption information and processed/stored data. Differential power analysis (DPA) and leakage power analysis (LPA) attacks are two types of PAA that exploit different characteristics of the side-channel leakage profile. DPA attacks exploit the correlation between the input data and dynamic power consumption of cryptographic circuits. Alternatively, LPA attacks utilize the correlation between the …
Embedded System Design Of A Real-Time Parking Guidance System, Omkar Dokur
Embedded System Design Of A Real-Time Parking Guidance System, Omkar Dokur
USF Tampa Graduate Theses and Dissertations
The primary objective of this work is to design a parking guidance system to reliably detect entering/exiting vehicles to a parking garage in a cost-efficient manner. Existing solutions (inductive loops, RFID based systems, and video image processors) at shopping malls, universities, airports etc., are expensive due to high installation and maintenance costs. There is a need for a parking guidance system that is reliable, accurate, and cost-effective. The proposed parking guidance system is designed to optimize the use of parking spaces and to reduce wait times. Based on a literature review we identify that the ultrasonic sensor is suitable to …
Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun
Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun
USF Tampa Graduate Theses and Dissertations
Wireless Sensor Networks (WSNs) continue to grow as one of the most exciting and challenging research areas of engineering. They are characterized by severely constrained computational and energy
resources and also restricted by the ad-hoc network operational
environment. They pose unique challenges, due to limited power
supplies, low transmission bandwidth, small memory sizes and limited energy. Therefore, security techniques used in traditional networks cannot be directly adopted. So, new ideas and approaches are needed, in order to increase the overall security of the network. Security applications in such resource constrained WSNs with minimum overhead provides significant challenges, and is the …